Cyber Security In Space Communications

Increasing demand for satellite communications connectivity and ground observation data, along with the continued conflict in Ukraine and escalating international geopolitical tensions in Gaza and Israel, has sparked a burgeoning interest and substantial investment in the space economy. 

The global space industry, currently valued at around $350 billion, projected to be worth $1 trillion by 2040. With so much at stake,  securing space-based systems has become a  crritical issue.

The Head of Space at the Ministry of Economic Affairs and Communications for Estonia, Paul Liias has said that the main drivers of investment are geopolitical tensions and the increasing demand for satellite communications. “Over the last 12 months as well, the conflict in Ukraine has underscored the strategic importance of space-based satellites and systems, more so than was the case three or four years ago... More than ever, we have a responsibility to manage and protect these systems properly with the latest cybersecurity measures,” Liias in advance the Software Defined Space Conference in Estonia.

The 3rd annual SDSC event focuses on cyber security in space, will take place Oct. 31 to Nov. 2 in Tallinn. The primary focus of this year’s event focused on software development and cyber security  in space technology. 

Liias focused on the importance of cyber security, saying that in order to protect space-based systems from cyber attacks, it is absolutely crucial to bring down the costs. “Developers working in space cyber security have to manage competing priorities. On the one hand, they must investigate, identify, and understand potential threats, and on the other, develop effective countermeasures at an affordable price point. Making space cyber security accessible and affordable is key,” he said.

Estonia is the home of the NATO Cooperative Cyber Defense Centre of Excellence and has been focusing on protecting critical infrastructure like power grids and government IT systems. The goernment now wants to apply its cyber security expertise to space-based assets.

Estonian - Software Defined Space Conference:  I-HLS:    Industrial Cyber:    Cybernews:   

Defense Post:     NATO/CCDCOE:         Image: falco

You Might Also Read: 

Satellite Systems Security Needs To Be Reinforced Against Cyber Attack:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« ZTNA Is The Foundation Of Great VDI Deployments
Iranian State Sponsored Hackers On The Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Covenco

Covenco

Covenco is a data management and IT infrastructure specialist. Working with customers to transform their IT environments, with data protection and security at the forefront of everything we do.

MailGuard

MailGuard

MailGuard delivers a full suite of security solutions across email and web to protect your business before threats reach your environment.

Paladion

Paladion

Paladion is a provider of managed IT security services.

Cyber Affairs

Cyber Affairs

Cyber Affairs is the first Italian press agency entirely dedicated to cyber security.

Bottomline Technologies

Bottomline Technologies

Bottomline Technologies is an innovator in business payment automation technology, helping companies make complex business payments simple, smart and secure.

NESECO

NESECO

NESECO is an IT security integration and consulting firm providing security products, solutions, support, consulting, and training services.

Tech-Recycle

Tech-Recycle

Tech-Recycle was formed to help companies and individuals securely, ethically and easily recycle their IT and office equipment. We destroy all data passed to us safely and securely.

Improsec

Improsec

Improsec is a fully independent Cyber Security advisory company - we provide knowledge, experience and both strategic and deep technical expertise to our clients.

IT Search

IT Search

IT Search is a specialist IT recruitment company focusing on Cyber Security, IT Infrastructure, Software, Data, Digital Transformation and C Suite leadership positions.

Moss Adams

Moss Adams

Moss Adams is a fully integrated professional services firm dedicated to assisting clients with growing, managing, and protecting prosperity.

Numen Cyber Technology

Numen Cyber Technology

Numen Cyber Technology is committed to becoming a Threat Discovery and Response expert for corporate customers.

Minorities in Cybersecurity (MiC)

Minorities in Cybersecurity (MiC)

MiC was developed out of a unique passion to help fill the gap that exists in the support and development of women and minority leaders in the cybersecurity field.

ANSSI Burkina Faso

ANSSI Burkina Faso

ANSSI is responsible for managing the security of information systems and cyberspace in Burkina Faso.

ShieldIO

ShieldIO

ShieldIO Real-Time Homomorphic Encryption™ enables your organization to reach regulatory compliance without compromising data availability.

Vigilant Ops

Vigilant Ops

Vigilant Ops is a leader in Software Bill of Materials (SBOM) Automation. A proactive approach to cybersecurity with continuous vulnerability monitoring.

Backblaze

Backblaze

The Backblaze Storage Cloud provides a foundation for businesses, developers, IT professionals, and individuals to build applications, host content, manage media, back up and archive data, and more.